| /freebsd/crypto/krb5/src/lib/kadm5/ |
| H A D | chpass_util.c | 59 unsigned int msg_len) in _kadm5_chpass_principal_util() argument 94 msg_len - 1); in _kadm5_chpass_principal_util() 95 msg_ret[msg_len - 1] = '\0'; in _kadm5_chpass_principal_util() 98 snprintf(msg_ret, msg_len, "%s %s\n\n%s", in _kadm5_chpass_principal_util() 102 msg_ret[msg_len - 1] = '\0'; in _kadm5_chpass_principal_util() 110 strncpy(msg_ret, string_text(CHPASS_UTIL_NO_PASSWORD_READ), msg_len - 1); in _kadm5_chpass_principal_util() 111 msg_ret[msg_len - 1] = '\0'; in _kadm5_chpass_principal_util() 127 strncpy(msg_ret, string_text(CHPASS_UTIL_PASSWORD_CHANGED), msg_len - 1); in _kadm5_chpass_principal_util() 128 msg_ret[msg_len - 1] = '\0'; in _kadm5_chpass_principal_util() 136 snprintf(msg_ret, msg_len, "%s\n%s %s\n", in _kadm5_chpass_principal_util() [all …]
|
| /freebsd/crypto/openssl/ssl/statem/ |
| H A D | statem_dtls.c | 20 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument 37 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) \ 41 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) \ 44 for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0; ii--) \ 137 if (!ossl_assert(s->init_num == s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH)) in dtls1_do_write() 301 l2n3(msg_hdr->msg_len, p); in dtls1_do_write() 304 l2n3(msg_hdr->msg_len, p); in dtls1_do_write() 348 size_t msg_len; in dtls_get_message() 33 RSMBLY_BITMASK_IS_COMPLETE(bitmask,msg_len,is_complete) global() argument 341 size_t msg_len; dtls_get_message() local 400 size_t msg_len = s->init_num + DTLS1_HM_HEADER_LENGTH; dtls_get_message_body() local 449 size_t frag_off, frag_len, msg_len; dtls1_preprocess_fragment() local [all...] |
| /freebsd/sys/dev/ipmi/ |
| H A D | ipmi_opal.c | 82 opal_ipmi_recv(struct opal_ipmi_softc *sc, uint64_t *msg_len, int timo) in opal_ipmi_recv() argument 91 *msg_len = sizeof(struct opal_ipmi_msg) + IPMI_MAX_RX; in opal_ipmi_recv() 95 vtophys(sc->sc_msg), vtophys(msg_len)); in opal_ipmi_recv() 96 *msg_len = be64toh(*msg_len); in opal_ipmi_recv() 113 sc->sc_msg->data[0], *msg_len); in opal_ipmi_recv() 127 uint64_t msg_len; in opal_ipmi_discard_msgs() local 134 err = opal_ipmi_recv(sc, &msg_len, 100); in opal_ipmi_discard_msgs() 138 err = opal_ipmi_recv(sc, &msg_len, 10); in opal_ipmi_discard_msgs() 149 uint64_t msg_len; in opal_ipmi_polled_request() local 170 msg_len = sizeof(*sc->sc_msg) + req->ir_requestlen; in opal_ipmi_polled_request() [all …]
|
| /freebsd/crypto/openssh/ |
| H A D | msg.c | 70 u_int msg_len; in ssh_msg_recv() local 80 msg_len = get_u32(buf); in ssh_msg_recv() 81 if (msg_len > sshbuf_max_size(m)) { in ssh_msg_recv() 82 error_f("read: bad msg_len %u", msg_len); in ssh_msg_recv() 86 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) { in ssh_msg_recv() 90 if (atomicio(read, fd, p, msg_len) != msg_len) { in ssh_msg_recv()
|
| H A D | ssh-pkcs11-helper.c | 277 u_int msg_len; in process() local 288 msg_len = get_u32(cp); in process() 289 if (msg_len > MAX_MSG_LENGTH) { in process() 290 error("bad message len %d", msg_len); in process() 293 if (buf_len < msg_len + 4) in process() 322 if (msg_len < consumed) { in process() 323 error("msg_len %d < consumed %d", msg_len, consumed); in process() 326 if (msg_len > consumed) { in process() 327 if ((r = sshbuf_consume(iqueue, msg_len - consumed)) != 0) in process()
|
| /freebsd/crypto/openssl/crypto/sm2/ |
| H A D | sm2_crypt.c | 88 size_t msg_len, size_t *ct_size) in ossl_sm2_ciphertext_size() argument 100 + ASN1_object_size(0, msg_len, V_ASN1_OCTET_STRING); in ossl_sm2_ciphertext_size() 109 const uint8_t *msg, size_t msg_len, in ossl_sm2_encrypt() argument 183 msg_mask = OPENSSL_zalloc(msg_len); in ossl_sm2_encrypt() 208 if (!ossl_ecdh_kdf_X9_63(msg_mask, msg_len, x2y2, 2 * field_size, NULL, 0, in ossl_sm2_encrypt() 214 if (is_all_zeros(msg_mask, msg_len)) { in ossl_sm2_encrypt() 219 for (i = 0; i != msg_len; ++i) in ossl_sm2_encrypt() 229 || EVP_DigestUpdate(hash, msg, msg_len) == 0 in ossl_sm2_encrypt() 246 || !ASN1_OCTET_STRING_set(ctext_struct.C2, msg_mask, msg_len)) { in ossl_sm2_encrypt() 295 int msg_len in ossl_sm2_decrypt() local [all...] |
| /freebsd/contrib/tcpdump/ |
| H A D | print-olsr.c | 92 nd_uint16_t msg_len; member 102 nd_uint16_t msg_len; member 320 u_int msg_type, msg_len, msg_tlen, hello_len; in olsr_print() local 366 msg_len = GET_BE_U_2(msgptr.v6->msg_len); in olsr_print() 367 if ((msg_len >= sizeof (struct olsr_msg6)) in olsr_print() 368 && (msg_len <= length)) in olsr_print() 372 if (msg_type == 0 || msg_len == 0) { in olsr_print() 384 msg_len, (msg_len_valid == 0) ? " (invalid)" : ""); in olsr_print() 389 msg_tlen = msg_len - sizeof(struct olsr_msg6); in olsr_print() 395 msg_len = GET_BE_U_2(msgptr.v4->msg_len); in olsr_print() [all …]
|
| H A D | print-ldp.c | 578 u_short pdu_len,msg_len,msg_type; in ldp_pdu_print() local 625 msg_len=GET_BE_U_2(ldp_msg_header->length); in ldp_pdu_print() 628 if (msg_len < sizeof(struct ldp_msg_header)-4) { in ldp_pdu_print() 636 msg_len, in ldp_pdu_print() 647 msg_len, in ldp_pdu_print() 652 msg_tlen=msg_len-(sizeof(struct ldp_msg_header)-4); /* Type & Length fields not included */ in ldp_pdu_print() 655 ND_TCHECK_LEN(tptr, msg_len); in ldp_pdu_print() 694 msg_len); in ldp_pdu_print() 696 tptr += msg_len+4; in ldp_pdu_print() 697 tlen -= msg_len+4; in ldp_pdu_print()
|
| /freebsd/crypto/openssl/crypto/slh_dsa/ |
| H A D | slh_dsa.c | 35 * @param msg_len The size of |msg| 43 const uint8_t *msg, size_t msg_len, in slh_sign_internal() argument 97 if (!hashf->PRF_MSG(hctx, SLH_DSA_SK_PRF(priv), opt_rand, msg, msg_len, wpkt) in slh_sign_internal() 99 || !hashf->H_MSG(hctx, r, pk_seed, SLH_DSA_PK_ROOT(priv), msg, msg_len, in slh_sign_internal() 142 * @param msg_len The size of |msg| 148 const uint8_t *msg, size_t msg_len, in slh_verify_internal() argument 186 if (!hashf->H_MSG(hctx, r, pk_seed, pk_root, msg, msg_len, in slh_verify_internal() 218 * @param msg_len The size of |msg| 231 static uint8_t *msg_encode(const uint8_t *msg, size_t msg_len, in msg_encode() argument 240 *out_len = msg_len; in msg_encode() 268 ossl_slh_dsa_sign(SLH_DSA_HASH_CTX * slh_ctx,const uint8_t * msg,size_t msg_len,const uint8_t * ctx,size_t ctx_len,const uint8_t * add_rand,int encode,unsigned char * sig,size_t * siglen,size_t sigsize) ossl_slh_dsa_sign() argument 294 ossl_slh_dsa_verify(SLH_DSA_HASH_CTX * slh_ctx,const uint8_t * msg,size_t msg_len,const uint8_t * ctx,size_t ctx_len,int encode,const uint8_t * sig,size_t sig_len) ossl_slh_dsa_verify() argument [all...] |
| H A D | slh_hash.c | 67 const uint8_t *msg, size_t msg_len, in slh_hmsg_shake() argument 75 msg, msg_len, out, m); in slh_hmsg_shake() 92 const uint8_t *opt_rand, const uint8_t *msg, size_t msg_len, in slh_prf_msg_shake() argument 99 return xof_digest_3(ctx->md_ctx, sk_prf, n, opt_rand, n, msg, msg_len, out, n) in slh_prf_msg_shake() 151 const uint8_t *pk_root, const uint8_t *msg, size_t msg_len, in slh_hmsg_sha2() argument 166 return digest_4(hctx->md_big_ctx, r, n, pk_seed, n, pk_root, n, msg, msg_len, in slh_hmsg_sha2() 174 const uint8_t *msg, size_t msg_len, WPACKET *pkt) in slh_prf_msg_sha2() argument 205 && EVP_MAC_update(mctx, msg, msg_len) == 1 in slh_prf_msg_sha2()
|
| /freebsd/crypto/krb5/src/kadmin/server/ |
| H A D | misc.c | 19 char *msg_ret, unsigned int msg_len) in schpw_util_wrapper() argument 36 msg_len); in schpw_util_wrapper() 40 ret = check_min_life(server_handle, target, msg_ret, msg_len); in schpw_util_wrapper() 50 msg_ret, msg_len); in schpw_util_wrapper() 53 strlcpy(msg_ret, "Unauthorized request", msg_len); in schpw_util_wrapper() 61 char *msg_ret, unsigned int msg_len) in check_min_life() argument 102 if (strlen(errstr) + strlen(time_string) < msg_len) { in check_min_life() 105 snprintf(msg_ret, msg_len, errstr, time_string); in check_min_life()
|
| /freebsd/crypto/krb5/src/lib/gssapi/spnego/ |
| H A D | negoex_util.c | 167 const uint8_t *msg_base, size_t msg_len) in vector_base() argument 169 if (offset > msg_len || count > (msg_len - offset) / width) in vector_base() 227 const uint8_t *msg_base, size_t msg_len, in parse_nego_message() argument 246 msg->schemes = vector_base(offset, count, GUID_LENGTH, msg_base, msg_len); in parse_nego_message() 255 p = vector_base(offset, count, EXTENSION_LENGTH, msg_base, msg_len); in parse_nego_message() 269 const uint8_t *msg_base, size_t msg_len, in parse_exchange_message() argument 281 p = vector_base(offset, len, 1, msg_base, msg_len); in parse_exchange_message() 294 const uint8_t *msg_base, size_t msg_len, in parse_verify_message() argument 319 msg->cksum = vector_base(offset, len, 1, msg_base, msg_len); in parse_verify_message() 332 const uint8_t *msg_base, size_t msg_len, in parse_alert_message() argument [all …]
|
| /freebsd/crypto/openssl/test/ |
| H A D | sm2_internal_test.c | 139 const size_t msg_len = strlen(message); in test_sm2_crypt() 148 size_t recovered_len = msg_len; in test_sm2_crypt() 165 || !TEST_true(ossl_sm2_ciphertext_size(key, digest, msg_len, in test_sm2_crypt() 175 (const uint8_t *)message, msg_len, in test_sm2_crypt() 186 || !TEST_int_eq(ptext_len, msg_len)) in test_sm2_crypt() 193 || !TEST_int_eq(recovered_len, msg_len) in test_sm2_crypt() 194 || !TEST_mem_eq(recovered, recovered_len, message, msg_len)) in test_sm2_crypt() 308 const size_t msg_len = strlen(message); in test_sm2_sign() 338 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign() 354 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign() 140 const size_t msg_len = strlen(message); test_sm2_crypt() local 311 const size_t msg_len = strlen(message); test_sm2_sign() local [all...] |
| H A D | slh_dsa_test.c | 232 td->msg, td->msg_len), in do_slh_dsa_verify() 279 td->msg, td->msg_len), in slh_dsa_sign_verify_test() 286 td->msg, td->msg_len), in slh_dsa_sign_verify_test() 382 size_t msg_len = sizeof(msg) - 1; in slh_dsa_usage_test() 407 if (!TEST_int_eq(EVP_PKEY_sign(sctx, NULL, &sig_len, msg, msg_len), 1) in slh_dsa_usage_test() 409 || !TEST_int_eq(EVP_PKEY_sign(sctx, sig, &sig_len, msg, msg_len), 1)) in slh_dsa_usage_test() 421 || !TEST_int_eq(EVP_PKEY_verify(vctx, sig, sig_len, msg, msg_len), 1)) in slh_dsa_usage_test() 452 size_t msg_len = sizeof(msg); in slh_dsa_deterministic_usage_test() 488 if (!TEST_int_eq(EVP_PKEY_sign(sctx, NULL, &sig_len, msg, msg_len), 1)) in slh_dsa_deterministic_usage_test() 492 || !TEST_int_eq(EVP_PKEY_sign(sctx, sig, &len, msg, msg_len), in slh_dsa_deterministic_usage_test() 375 size_t msg_len = sizeof(msg) - 1; slh_dsa_usage_test() local 445 size_t msg_len = sizeof(msg); slh_dsa_deterministic_usage_test() local 532 size_t msg_len = sizeof(msg); slh_dsa_digest_sign_verify_test() local [all...] |
| H A D | ml_dsa_test.c | 153 td->msg, td->msg_len), in ml_dsa_siggen_test() 160 td->msg, td->msg_len), in ml_dsa_siggen_test() 199 td->msg, td->msg_len), in ml_dsa_sigver_test() 373 size_t msg_len; 422 if (!TEST_int_eq(EVP_PKEY_sign(sctx, NULL, &sig_len, sp->msg, sp->msg_len), 1) in do_ml_dsa_sign_verify() 426 if (!TEST_int_eq(EVP_PKEY_sign(sctx, sig, &sig_len, sp->msg, sp->msg_len), 0)) in do_ml_dsa_sign_verify() 429 if (!TEST_int_eq(EVP_PKEY_sign(sctx, sig, &sig_len, sp->msg, sp->msg_len), 1) in do_ml_dsa_sign_verify() 432 || !TEST_int_eq(EVP_PKEY_verify(vctx, sig, sig_len, sp->msg, sp->msg_len), 1)) in do_ml_dsa_sign_verify() 490 if (!TEST_int_eq(EVP_DigestSign(mctx, NULL, &sig_len, sp->msg, sp->msg_len), 1) in ml_dsa_digest_sign_verify_test() 494 if (!TEST_int_eq(EVP_DigestSign(mctx, sig, &sig_len, sp->msg, sp->msg_len), in ml_dsa_digest_sign_verify_test() 366 size_t msg_len; global() member [all...] |
| /freebsd/sys/dev/qat/qat_common/ |
| H A D | adf_pfvf_vf_proto.c | 259 unsigned int msg_len; in adf_send_vf2pf_blkmsg_req() local 312 msg_len = in adf_send_vf2pf_blkmsg_req() 314 msg_len = min(*buffer_len, msg_len); in adf_send_vf2pf_blkmsg_req() 317 for (index = ADF_PFVF_BLKMSG_HEADER_SIZE; index < msg_len; index++) { in adf_send_vf2pf_blkmsg_req() 326 ret = adf_vf2pf_blkmsg_get_crc(accel_dev, type, msg_len, &remote_crc); in adf_send_vf2pf_blkmsg_req() 330 local_crc = adf_pfvf_calc_blkmsg_crc(buffer, msg_len); in adf_send_vf2pf_blkmsg_req() 341 *buffer_len = msg_len; in adf_send_vf2pf_blkmsg_req()
|
| /freebsd/crypto/openssl/include/crypto/ |
| H A D | sm2.h | 41 const uint8_t *msg, size_t msg_len); 48 const uint8_t *msg, size_t msg_len); 68 size_t msg_len, size_t *ct_size); 75 const uint8_t *msg, size_t msg_len,
|
| /freebsd/sys/arm/broadcom/bcm2835/ |
| H A D | bcm2835_firmware.c | 116 size_t msg_len; in bcm2835_firmware_property() local 126 msg_len = sizeof(*msg_hdr) + len + sizeof(uint32_t); in bcm2835_firmware_property() 127 msg_hdr = malloc(sizeof(*msg_hdr) + msg_len + sizeof(uint32_t), in bcm2835_firmware_property() 130 msg_hdr->hdr.buf_size = msg_len; in bcm2835_firmware_property() 137 err = bcm2835_mbox_property(msg_hdr, msg_len); in bcm2835_firmware_property()
|
| /freebsd/crypto/openssl/crypto/ml_dsa/ |
| H A D | ml_dsa_sign.c | 313 * @param msg_len The size of |msg| 326 static uint8_t *msg_encode(const uint8_t *msg, size_t msg_len, 335 *out_len = msg_len; in msg_encode() 342 encoded_len = 1 + 1 + ctx_len + msg_len; in msg_encode() 354 memcpy(&encoded[2 + ctx_len], msg, msg_len); in msg_encode() 364 const uint8_t *msg, size_t msg_len, 380 m_len = msg_len; in ossl_ml_dsa_sign() 382 m = msg_encode(msg, msg_len, context, context_len, encode, in ossl_ml_dsa_sign() 402 const uint8_t *msg, size_t msg_len, 416 m_len = msg_len; in ossl_ml_dsa_verify() 330 msg_encode(const uint8_t * msg,size_t msg_len,const uint8_t * ctx,size_t ctx_len,int encode,uint8_t * tmp,size_t tmp_len,size_t * out_len) msg_encode() argument 368 ossl_ml_dsa_sign(const ML_DSA_KEY * priv,int msg_is_mu,const uint8_t * msg,size_t msg_len,const uint8_t * context,size_t context_len,const uint8_t * rand,size_t rand_len,int encode,unsigned char * sig,size_t * sig_len,size_t sig_size) ossl_ml_dsa_sign() argument 406 ossl_ml_dsa_verify(const ML_DSA_KEY * pub,int msg_is_mu,const uint8_t * msg,size_t msg_len,const uint8_t * context,size_t context_len,int encode,const uint8_t * sig,size_t sig_len) ossl_ml_dsa_verify() argument [all...] |
| /freebsd/crypto/openssl/fuzz/ |
| H A D | slh-dsa.c | 316 size_t msg_len; in slh_dsa_sign_verify() local 341 msg_len = *len; in slh_dsa_sign_verify() 343 /* if msg_len > 255, sign_message_init will fail */ in slh_dsa_sign_verify() 344 if (msg_len > 255 && (selector & 0x1) != 0) in slh_dsa_sign_verify() 351 msg, msg_len); in slh_dsa_sign_verify() 387 OPENSSL_assert(EVP_PKEY_sign(ctx, NULL, &sig_len, msg, msg_len)); in slh_dsa_sign_verify() 391 OPENSSL_assert(EVP_PKEY_sign(ctx, sig, &sig_len, msg, msg_len)); in slh_dsa_sign_verify() 394 OPENSSL_assert(EVP_PKEY_verify(ctx, sig, sig_len, msg, msg_len)); in slh_dsa_sign_verify()
|
| /freebsd/contrib/wpa/src/eap_server/ |
| H A D | eap_server_gtc.c | 55 size_t msg_len; in eap_gtc_buildReq() local 59 msg_len = os_strlen(msg); in eap_gtc_buildReq() 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, in eap_gtc_buildReq() 69 wpabuf_put_data(req, msg, msg_len); in eap_gtc_buildReq()
|
| /freebsd/crypto/krb5/src/lib/kadm5/clnt/ |
| H A D | clnt_chpass_util.c | 10 unsigned int msg_len) in kadm5_chpass_principal_util() argument 16 new_pw, ret_pw, msg_ret, msg_len); in kadm5_chpass_principal_util()
|
| /freebsd/crypto/krb5/src/lib/kadm5/srv/ |
| H A D | svr_chpass_util.c | 10 unsigned int msg_len) in kadm5_chpass_principal_util() argument 16 new_pw, ret_pw, msg_ret, msg_len); in kadm5_chpass_principal_util()
|
| /freebsd/contrib/wpa/wpa_supplicant/ |
| H A D | preauth_test.c | 53 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() argument 57 *msg_len = sizeof(*hdr) + data_len; in wpa_alloc_eapol() 58 hdr = os_malloc(*msg_len); in wpa_alloc_eapol() 80 size_t *msg_len, void **data_pos) in _wpa_alloc_eapol() argument 82 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); in _wpa_alloc_eapol()
|
| /freebsd/lib/libtacplus/ |
| H A D | taclib_private.h | 81 u_int16_t msg_len; member 108 u_int16_t msg_len; member 127 u_int16_t msg_len; member
|